Collection's Items (Sorted by Submit Date in Descending order): 661 to 680 of 824
| Preview | Issue Date | Title | Author(s) |
| 2016-08 | ROBUST DATABASE WATERMARKING TECHNIQUE FOR NUMERICAL DATA | VERMA, ARPIT |
| 2016-08 | DATA MINING USING SUPERVISED MACHINE LEARNING TECHNIQUES | RITU |
| 2016-08 | CONTENT CHARACTERISTIC BASED ROBUST DATABASE WATERMARKING | GOEL, RITESH |
| 2016-08 | IMAGE ENHANCEMENT USING ADAPTIVE TRANSFORMATION | MAURYA, ROHIT KUMAR |
| 2016-08 | BRIGHTNESS PRESERVING CONTRAST ENHANCEMENT USING ADAPTIVE GAMMA CORRECTION | GOSWAMI, ANCHAL |
| 2016-08 | A NOVEL APPROACH FOR PRIVACY PRESERVING DATA MINING USING RANDOMIZATION | PRADEEPKUMAR, INGLE |
| 2016-08 | ANALYZING SECURITY BREACH AND DATA LEAKAGE IN MOBILE APPLICATIONS USING ILLEGITIMATE SERVER CONNECTIONS | DHAMA, VIKRANT |
| 2016-08 | ASSOCIATING PRIVATE KEYS IN CRYPTOGRAPHY WITH USER GENERATED BIOMETRICS | KUMAR, DINESH |
| 2016-08 | PARALLEL META-HEURISTIC ALGORITHM FOR CLUSTERING | BANSAL, NUPUR |
| 2016-08 | EDGE DETECTION ON GRAYSCALE IMAGES USING THE PYTHAGOREAN THEOREM | RABHA, MONIKA |
| 2016-08 | BOTNET DETECTION AND OPTIMIZATION USING HONEYPOT | SRIVASTAVA, PRAKHAR |
| 2016-08 | ROTATION AND SCALE INVARIANT OBJECT DETECTION | CHOUDHARY, SUCHITRA |
| 2016-08 | COGNITIVE PACKET NETWORK | DIXIT, KISHORE CHANDRA |
| 2016-08 | WEB APPLICATION TESTING | MADAN, SANSKRITI |
| 2016-08 | DEFECT SEVERITY PREDICTION USING TEXT MINING | SRIVASTAVA, YOGESH KUMAR |
| 2016-07 | SOFTWARE TEST DATA GENERATION USING GENETIC ALGORITHM | GUPTA, ASHISH |
| 2016-07 | INVESTIGATING THE EFFECTS OF REFACTORING ON SOFTWARE MAINTAINABILITY | GAUR, SACHIN |
| 2016-07 | EMPIRICAL VALIDATION OF OBJECT ORIENTED METRICS USING MACHINE LEARNING METHODS | SHARMA, KAPIL |
| 2016-07 | FEDERAL IDENTITY MANAGEMENT USING HIERARCHICAL IDENTITYBASED CRYPTOGRAPHY (HIBC) | GOEL, AARTI |
| 2016-07 | VEHICLE ROUTING PROBLEM WITH CAPACITY CONSTRAINT | JAKHAR, SACHIN |
Collection's Items (Sorted by Submit Date in Descending order): 661 to 680 of 824